US8370431B1 - Secure desktop for a network meeting - Google Patents

Secure desktop for a network meeting Download PDF

Info

Publication number
US8370431B1
US8370431B1 US11/280,511 US28051105A US8370431B1 US 8370431 B1 US8370431 B1 US 8370431B1 US 28051105 A US28051105 A US 28051105A US 8370431 B1 US8370431 B1 US 8370431B1
Authority
US
United States
Prior art keywords
desktop
secure
presenter
presenter device
network meeting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US11/280,511
Inventor
Wanchun Wang
Hao Xu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Pulse Secure LLC
Original Assignee
Juniper Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US11/280,511 priority Critical patent/US8370431B1/en
Assigned to JUNIPER NETWORKS, INC. reassignment JUNIPER NETWORKS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: XU, HAO, WANG, WANCHUN
Application filed by Juniper Networks Inc filed Critical Juniper Networks Inc
Application granted granted Critical
Publication of US8370431B1 publication Critical patent/US8370431B1/en
Assigned to JUNIPER NETWORKS, INC. reassignment JUNIPER NETWORKS, INC. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PULSE SECURE, LLC, SMOBILE SYSTEMS, INC.
Assigned to PULSE SECURE, LLC reassignment PULSE SECURE, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: JUNIPER NETWORKS, INC.
Assigned to U.S BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT reassignment U.S BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PULSE SECURE, LLC
Assigned to PULSE SECURE, LLC reassignment PULSE SECURE, LLC RELEASE OF SECURITY INTEREST RECORDED AT REEL 037338, FRAME 0408 Assignors: US BANK NATIONAL ASSOCIATION
Assigned to CERBERUS BUSINESS FINANCE, LLC, AS COLLATERAL AGENT reassignment CERBERUS BUSINESS FINANCE, LLC, AS COLLATERAL AGENT GRANT OF SECURITY INTEREST PATENTS Assignors: PULSE SECURE, LLC
Assigned to SMOBILE SYSTEMS, INC., PULSE SECURE, LLC reassignment SMOBILE SYSTEMS, INC. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: JUNIPER NETWORKS, INC.
Assigned to PULSE SECURE, LLC reassignment PULSE SECURE, LLC RELEASE OF SECURITY INTEREST RECORDED AT REEL/FRAME 042380/0859 Assignors: CERBERUS BUSINESS FINANCE, LLC, AS AGENT
Assigned to KKR LOAN ADMINISTRATION SERVICES LLC, AS COLLATERAL AGENT reassignment KKR LOAN ADMINISTRATION SERVICES LLC, AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PULSE SECURE, LLC
Assigned to PULSE SECURE, LLC reassignment PULSE SECURE, LLC RELEASE OF SECURITY INTEREST : RECORDED AT REEL/FRAME - 053638-0220 Assignors: KKR LOAN ADMINISTRATION SERVICES LLC
Assigned to BANK OF AMERICA, N.A., AS COLLATERAL AGENT reassignment BANK OF AMERICA, N.A., AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CellSec, Inc., INVANTI US LLC, INVANTI, INC., MobileIron, Inc., PULSE SECURE, LLC
Assigned to MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT reassignment MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CellSec, Inc., IVANTI US LLC, IVANTI, INC., MobileIron, Inc., PULSE SECURE, LLC
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • H04L65/403Arrangements for multi-party communication, e.g. for conferences
    • H04L65/4038Arrangements for multi-party communication, e.g. for conferences with floor control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine

Definitions

  • a device comprises a network meeting application executing within a working desktop, wherein the network meeting application receives a request for a network meeting.
  • the device further comprises a secure desktop created by the network meeting application in response to the request.
  • a system comprises a presenter device associated with a virtual private network (VPN) server, wherein a network meeting application executes within a working desktop of the presenter device.
  • the system further comprises one or more attendee devices associated with the VPN server. At least one of the attendee devices requests a network meeting from the presenter device.
  • the presenter device creates a secure desktop using the network meeting application in response to the request.
  • VPN virtual private network
  • the presenter may seamlessly switch back and forth between the working desktop and the secure desktop on presenter device 10 using an icon provided on the working desktop and secure desktop. In this manner, the presenter may choose which desktop to view at a given time. In contrast, attendees sharing the secure desktop of presenter device 10 via attendee devices 12 may not switch to the working desktop. Rather, attendees may only view the secure desktop. In this manner, the attendees are prevented from opening files or running applications from the working desktop, and may not have access to sensitive information on the presenter's working desktop, such as emails or address books.
  • the presenter may use the secure desktop to share documents, presentations, or other applications with the attendees.
  • Attendees may be allowed to remotely control the secure desktop 40 of presenter device 10 , using attendee devices 12 .
  • the start menu 46 provides a limited amount of options to a remotely controlling attendee. These options are controlled by the security policies. Due to the security policies, an attendee may be prevented from launching certain applications or taking certain actions within secure desktop 40 .
  • FIG. 5 is an exemplary screen illustration depicting an example working desktop 50 as viewed on presenter device 10 ( FIG. 1 ).
  • the presenter uses the working desktop for running a number of applications.
  • start menu 52 of FIG. 5 provides a wider range of applications for the presenter than are available on the secure desktop start menu 46 of FIG. 4 .
  • the working desktop may not be accessed by attendee devices 12 during a web conference meeting with presenter device 10 .
  • an attendee that is remotely controlling the secure desktop of presenter device 10 does not have access to the applications shown on working desktop 50 .
  • the presenter may use switch icon 54 to switch between working desktop 50 and the secure desktop shown in FIG. 4 .
  • the network meeting application launches a sharing thread within the secure desktop.
  • the sharing thread applies the security policies received from the network meeting application to the secure desktop.
  • Secure desktop 60 includes a secure layer 64 that intercepts calls from applications 62 to operating system 70 .
  • the secure layer 64 checks the operating system call against security policies 68 to determine whether security policies 68 permit the operating system call.
  • the operating system call may contain instructions to run an application such as Task Manager. If security policies 68 restrict Task Manager from running within secure desktop 60 , secure layer 64 blocks the operating system call to operating system 70 .
  • Secure layer 64 also redirects calls from a registry or file system of presenter device 10 to temporary registry 66 or temporary file system 68 , respectively.
  • Temporary registry 66 and temporary file system 68 mimic the actual registry and file system of the presenter device without detection by applications 62 .
  • any access or change to the registry or files system within the secure desktop are localized within the secure desktop process space, and does not affect the working desktop or the presenter device generally. In other words, there is no “footprint” on the working desktop of actions taken in the secure desktop.
  • the network meeting application creates a secure desktop on presenter device 10 ( 74 ).
  • the secure desktop is isolated from the presenter device's working desktop.
  • Security policies downloaded at presenter device 10 from a VPN server 16 may be used to create the secure desktop.
  • the security policies may determine visual aspects of the secure desktop, such as wallpaper or desktop icons.
  • the security policies may also define the location of the temporary registry and temporary file system.
  • a secure layer of the secure desktop intercepts a call to the operating system ( 76 ).
  • the operating system call may originate from an attendee remotely controlling the secure desktop from a remote attendee device 12 .
  • the attendee may attempt to run an application such as the Control Panel application.
  • the secure layer checks the operating system call against the security policies to determine whether to allow or block the operating system call ( 78 ). If the security policies do not allow the operating system call, then the secure layer blocks the operating system call ( 80 ). If the security policies allow the operating system call, then the secure layer redirects the call to the temporary registry or the temporary file system of the secure desktop, instead of sending the call to the working desktop's registry or file system ( 82 ). In this manner, a separate secure desktop is created that provides an isolated environment for a web conference meeting. The secure desktop thereby protects the integrity of the presenter's working desktop, while allowing documents, presentations, or other applications to be shared with attendees via the secure desktop.

Abstract

A network meeting application for providing network meetings, such as web conference meetings, runs on a presenter device. In response to a request for a network meeting from an attendee device, the presenter device creates a secure desktop separate from a working desktop. The presenter may use the secure desktop to share documents, presentations, or other applications with the attendee device. The attendee device is blocked from accessing the working desktop of the presenter device. A presenter using the presenter device may switch between the working desktop and the secure desktop. Security policies, downloaded to the presenter device from a server, determine the applications the attendee may run on the secure desktop. The secure desktop thereby protects the integrity of the presenter's working desktop during a web conference meeting, while allowing documents, presentations, or other applications to be shared with attendees via the secure desktop.

Description

TECHNICAL FIELD
Principles of the invention relate to network meetings and, more particularly, to securely sharing computer applications and computer desktops during network meetings.
BACKGROUND
Network conferencing software allows two or more remote parties to conduct meetings over a public network such as the Internet. For example, remote parties may use web conferencing for services such as customer support, troubleshooting, training, interviewing, or sales meetings. A web conference meeting may consist of one or more presenters and one or more attendees, each of which may be located at a geographically remote site. Web conference software allows the presenters and attendees to share documents, presentations or other applications between their computers, and may allow an attendee to view or control a presenter's computer desktop.
Conventional web conference software operates on the presenter's working desktop. When an attendee remotely controls the presenter's working desktop, the attendee may open files and run applications from the working desktop. As a result, attendees may have access to sensitive information on the presenter's working desktop, such as emails or address books. Consequently, when using web conferencing software, presenters may feel as though sensitive information and working desktop integrity are at risk. Some web conference programs attempt to solve this problem by limiting the applications that a remotely controlling attendee may launch. However, sensitive information may be inadvertently shared with attendees. Further, actions taken by an attendee remotely controlling the presenter's desktop may directly impact the presenter's working desktop.
SUMMARY
In general, principles of the invention are directed to techniques for maintaining computer desktop security and, more specifically, providing a dedicated, secure desktop isolated from a working desktop that provides a secure environment for network meetings, e.g., web conference meetings. In particular, a network meeting application executes on a presenter device. In response to a request for a network meeting from an attendee device, the presenter device creates a secure desktop, through which documents, presentations, or other applications may be shared with the attendee device. The attendee device is blocked from accessing the working desktop of the presenter device. A presenter using the presenter device may switch between the working desktop and the secure desktop using a switch icon. In contrast, the attendee may view only the secure desktop, and not the working desktop. The attendee may remotely control the secure desktop of the presenter device from the attendee device.
Security policies, downloaded to the presenter device from a server, determine what types of applications the attendee may run on the secure desktop. If the attendee attempts to run an application that is restricted by the security policies, the network meeting application blocks the application from running on the secure desktop.
In one embodiment, a method comprises receiving a request for a network meeting at a presenter device having a working desktop and creating a secure desktop on the presenter device in response to the request.
In another embodiment, a device comprises a network meeting application executing within a working desktop, wherein the network meeting application receives a request for a network meeting. The device further comprises a secure desktop created by the network meeting application in response to the request.
In another embodiment, a system comprises a presenter device associated with a virtual private network (VPN) server, wherein a network meeting application executes within a working desktop of the presenter device. The system further comprises one or more attendee devices associated with the VPN server. At least one of the attendee devices requests a network meeting from the presenter device. In response, the presenter device creates a secure desktop using the network meeting application in response to the request.
In another embodiment, a computer-readable medium comprises instructions for causing a device to receive a request for a network meeting at a presenter device having a working desktop and create a secure desktop on the presenter device in response to the request.
The invention may provide on or more advantages. For example, the separate secure desktop provides an isolated environment for a web conference meeting. The secure desktop thereby protects the integrity of the presenter's working desktop, while allowing documents, presentations, or other applications to be shared with attendees via the secure desktop. In addition, the security policies may be set to prevent the secure desktop from running graphics-heavy applications, such as wallpaper or media players. In this manner, the amount of data sent over a virtual private network during a web conference may be greatly reduced, improving bandwidth and throughput.
The details of one or more embodiments of the invention are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the invention will be apparent from the description and drawings, and from the claims.
BRIEF DESCRIPTION OF DRAWINGS
FIG. 1 is a block diagram illustrating an example system in which a presenter device presents a network meeting attended by a plurality of attendees.
FIG. 2 is an exemplary screen illustration depicting an example secure desktop as viewed on a presenter device.
FIG. 3 is an exemplary screen illustration depicting an example secure desktop software page as viewed on a presenter device.
FIG. 4 is an exemplary screen illustration depicting an example secure desktop meeting viewer page of a secure desktop as viewed on a presenter device.
FIG. 5 is an exemplary screen illustration depicting an example working desktop as viewed on a presenter device.
FIG. 6 is a block diagram illustrating exemplary architecture of a secure desktop.
FIG. 7 is a flowchart illustrating example operation of a network meeting application in creating a secure desktop in accordance with the principles of the invention.
DETAILED DESCRIPTION
FIG. 1 is a block diagram illustrating an example system 8 in which a presenter device 10 presents a network meeting attended by a plurality of attendee devices 12A-12N (collectively, “attendees 12”). In this example, presenter device 10 resides in network 14. A virtual private network (VPN) server 16 located at the edge of network 14 provides VPN services to network 14. VPN server 16 may be a secure socket layer (SSL) VPN server that provides secure tunnels for sharing data over a public network, such as the Internet.
In the example of FIG. 1, a presenter using presenter device 10 and attendees using attendee devices 12 may engage in a network meeting, such as a web conference meeting. The web conference meeting may be, for example, for customer support, troubleshooting, training, interviewing, or a sales meeting. A network meeting application may be installed on attendee devices 12 and presenter device 10. A presenter may use the network meeting application to share documents, presentations, or other applications from presenter device 10 to attendee devices 12. Attendees operating attendee devices 12 may have access via the network meeting application to the shared applications running on presenter device 10.
In accordance with the principles of the invention, in response to a request for a web conference meeting, the network meeting application provides presenter device 10 with a secure desktop separate from a working desktop of presenter device 10. The working desktop is the presenter's main “desktop,” which is a software process that provides a user interface for launching and controlling the presenter's usual applications, such as email applications, word processing applications, media player applications, and other applications. The secure desktop is a separate desktop on presenter device 10 created in response to a web conference request. The secure desktop may be shared with attendee devices 12 and provides a platform for demonstration and sharing of certain authorized software applications, files or other resources, while the presenter device's working desktop is not shared and remains safe.
The secure desktop may be limited to running only certain applications; for example, the secure desktop may contain only the presentation applications to be shared with attendee devices 12. The types of applications that may be run or actions that may be taken on the secure desktop are controlled by security policies, which may be set by an administrator.
In one embodiment, the security policies may be contained on VPN server 16, and may be downloaded by presenter device 10 from VPN server 16. In the case where an attendee remotely controls the secure desktop, the attendee may only be able to run certain applications on the secure desktop, and the attendee may be prevented from taking certain actions on the secure desktop. For example, the attendee may not be allowed to run the Task Manager application, or may not be allowed to shut down the secure desktop.
Although the attendees are only able to view the secure desktop, the presenter may seamlessly switch back and forth between the working desktop and the secure desktop on presenter device 10 using an icon provided on the working desktop and secure desktop. In this manner, the presenter may choose which desktop to view at a given time. In contrast, attendees sharing the secure desktop of presenter device 10 via attendee devices 12 may not switch to the working desktop. Rather, attendees may only view the secure desktop. In this manner, the attendees are prevented from opening files or running applications from the working desktop, and may not have access to sensitive information on the presenter's working desktop, such as emails or address books.
Any changes made to documents, presentations, or other applications running on the secure desktop are made only to the secure desktop. No changes are made to these applications in the working desktop. Upon exiting the secure desktop, the presenter may choose to discard the changes made to the secure desktop applications, or may choose to save the changes to the working desktop.
FIG. 2 is an exemplary screen illustration depicting an example secure desktop 20 as viewed on presenter device 10 of FIG. 1. As illustrated in FIG. 2, the secure desktop is a separate desktop distinct from the presenter's working desktop. The secure desktop may have plain wallpaper or may have no wallpaper, to reduce the amount of data to be transferred over the VPN tunnel to the attendee devices 12. Providing the secure desktop with different wallpaper from the working desktop may help the presenter quickly determine which desktop is being viewed on presenter device 10.
The secure desktop 20 may contain a switch icon 22 that the presenter may click with a mouse to switch between the secure desktop 20 and a working desktop. The secure desktop 20 may be shared with attendees via web conferencing software. In this manner, attendees may view the secure desktop 20 on remote attendee devices 12. The presenter may share documents, presentations, or other applications with the attendees from the secure desktop 20. The attendees may remotely operate secure desktop 20 from the attendee devices 12.
FIG. 3 is an exemplary screen illustration depicting an example working desktop 30 of presenter device 10 (FIG. 1). Working desktop 30 may be visible to a presenter operating presenter device 10. However, working desktop 30 is not visible to an attendee of a web conference meeting.
As can be seen from taskbar 32, a number of applications may be running on the working desktop. In the example of FIG. 3, a network meeting application 34 is running on working desktop 30. In accordance with the principles of the invention, network meeting application 34 may provide a secure desktop settings page that allows an administrator, or the presenter, to set security policies for the secure desktop. In setting the security policies, the administrator may determine what type of applications may be run on the secure desktop, and may decide how the secure desktop will look by setting wallpaper and desktop icons. The administrator may also determine restricted actions that may not be taken from the secure desktop, and determine a location to which file and registry calls are detoured for the secure desktop.
For example, the administrator may create a list of applications that may be run on the secure desktop. Alternatively, or in addition, the administrator may create a list of applications that are specifically prevented from executing on the secure desktop. In the example of FIG. 3, security policies are currently set to prevent the Control Panel and Task Manager applications from running on the secure desktop. In this manner, the administrator may set up the secure desktop such that it provides a separate desktop isolated from the working desktop. The administrator may configure the secure desktop such that graphics-heavy applications, such as media player applications or wallpaper applications, are prevented from running on the secure desktop. Thus, the administrator may reduce the amount of traffic sent over the VPN tunnel during a web conference meeting.
FIG. 4 is an exemplary screen illustration depicting an example secure desktop meeting viewer page of a secure desktop 40 as viewed on presenter device 10 (FIG. 1). The screen illustration shows the secure desktop 40 overlaid on the working desktop 42, as viewed by the presenter. The presenter may switch between secure desktop 40 and working desktop 42 using switch icon 44.
When engaged in a web conference meeting with presenter device 10, attendees see only secure desktop 40 on their attendee devices 12. The wallpaper and icons of secure desktop 40 may be controlled by security policies set by an administrator, as described above with respect to FIG. 3. The secure desktop looks different from the working desktop, thus providing the presenter with a visual indication of which desktop he or she is presently viewing.
The presenter may use the secure desktop to share documents, presentations, or other applications with the attendees. Attendees may be allowed to remotely control the secure desktop 40 of presenter device 10, using attendee devices 12. As shown in FIG. 4, the start menu 46 provides a limited amount of options to a remotely controlling attendee. These options are controlled by the security policies. Due to the security policies, an attendee may be prevented from launching certain applications or taking certain actions within secure desktop 40.
FIG. 5 is an exemplary screen illustration depicting an example working desktop 50 as viewed on presenter device 10 (FIG. 1). The presenter uses the working desktop for running a number of applications. As can be seen from FIGS. 4 and 5, start menu 52 of FIG. 5 provides a wider range of applications for the presenter than are available on the secure desktop start menu 46 of FIG. 4. The working desktop may not be accessed by attendee devices 12 during a web conference meeting with presenter device 10. Similarly, an attendee that is remotely controlling the secure desktop of presenter device 10 does not have access to the applications shown on working desktop 50. The presenter may use switch icon 54 to switch between working desktop 50 and the secure desktop shown in FIG. 4.
FIG. 6 is a block diagram illustrating exemplary architecture of a secure desktop 60 that is created on a presenter device 10 in response to a request for a network meeting, such as a web conference meeting. Secure desktop 60 presents a number of applications 62A-62N (collectively, applications 62) to a plurality of attendees of the web conference meeting. Applications 62 may be web browsers, documents, presentations, or other applications that the presenter wants to share with the attendees. The types of applications that are permitted to run on secure desktop 60 may be defined by security policies 68. Security policies 68 may be set by an administrator, and may be downloaded to presenter device 10 from a VPN server such as VPN server 16 of FIG. 1.
In response to a request for a network meeting, a network meeting application creates secure desktop 60. As one example, for machines executing the Windows™ operating system for Microsoft Corporation, the network meeting application may utilize Windows™ NT Desktop Management APIs, which allows different desktops to be created within a single computing device such as Microsoft Windows Desktop Objects. Other tools may be used on other operating systems and computing platforms to create a separate desktop or other process for launching and controlling applications.
After creating the secure desktop, e.g., via Windows™ NT Desktop Management APIs, the network meeting application launches a sharing thread within the secure desktop. The sharing thread applies the security policies received from the network meeting application to the secure desktop.
Secure desktop 60 includes a secure layer 64 that intercepts calls from applications 62 to operating system 70. Upon intercepting a call, the secure layer 64 checks the operating system call against security policies 68 to determine whether security policies 68 permit the operating system call. For example, the operating system call may contain instructions to run an application such as Task Manager. If security policies 68 restrict Task Manager from running within secure desktop 60, secure layer 64 blocks the operating system call to operating system 70.
Secure layer 64 also redirects calls from a registry or file system of presenter device 10 to temporary registry 66 or temporary file system 68, respectively. Temporary registry 66 and temporary file system 68 mimic the actual registry and file system of the presenter device without detection by applications 62. Thus, any access or change to the registry or files system within the secure desktop are localized within the secure desktop process space, and does not affect the working desktop or the presenter device generally. In other words, there is no “footprint” on the working desktop of actions taken in the secure desktop.
When the presenter exits the secure desktop, the presenter may choose to either save any changes made in the secure desktop to the working desktop, or delete the changes by deleting the roots of temporary registry 66 and temporary file system 68. Secure layer 64 thus performs two main functions when intercepting operating system calls: first, checking the calls against security policies 68 to determine whether the calls are allowed; and second, redirecting allowed calls to the temporary registry 66 and temporary file system 68, so that the actual registry and file system of the presenters device remain untouched by actions taken in secure desktop 60.
FIG. 7 is a flowchart illustrating example operation of a network meeting application in creation and utilization of a secure desktop in accordance with the principles of the invention. Presenter device 10 receives a request from an attendee device 12 for a network meeting (72). The network meeting may be a web conference meeting such as a customer service, troubleshooting, sales, training, interviewing, or other type of meeting.
In response to the request, the network meeting application creates a secure desktop on presenter device 10 (74). The secure desktop is isolated from the presenter device's working desktop. Security policies downloaded at presenter device 10 from a VPN server 16 may be used to create the secure desktop. For example, the security policies may determine visual aspects of the secure desktop, such as wallpaper or desktop icons. The security policies may also define the location of the temporary registry and temporary file system.
A secure layer of the secure desktop intercepts a call to the operating system (76). The operating system call may originate from an attendee remotely controlling the secure desktop from a remote attendee device 12. For example, the attendee may attempt to run an application such as the Control Panel application. The secure layer checks the operating system call against the security policies to determine whether to allow or block the operating system call (78). If the security policies do not allow the operating system call, then the secure layer blocks the operating system call (80). If the security policies allow the operating system call, then the secure layer redirects the call to the temporary registry or the temporary file system of the secure desktop, instead of sending the call to the working desktop's registry or file system (82). In this manner, a separate secure desktop is created that provides an isolated environment for a web conference meeting. The secure desktop thereby protects the integrity of the presenter's working desktop, while allowing documents, presentations, or other applications to be shared with attendees via the secure desktop.
Various embodiments of the invention have been described. These and other embodiments are within the scope of the following claims.

Claims (33)

1. A method comprising:
with a network meeting application executing on a presenter device, receiving a request for a network meeting at the presenter device having a working desktop as a first environment for executing applications on the presenter device;
with the network meeting application, automatically creating, in response to the request, a secure desktop on the presenter device separate from the working desktop as a second environment in which software applications can be launched by the presenter on the presenter device and execute on the presenter device during the network meeting;
with the network meeting application, presenting the secure desktop to a remote device via the network meeting;
with the network meeting application, allowing remote control of the secure desktop of the presenter device by the remote device; and
with the network meeting application, blocking the remote device from accessing the working desktop of the presenter device.
2. The method of claim 1, further comprising:
intercepting an operating system call from a software application executing within the secure desktop; and
blocking the operating system call when security policies prevent the operating system call.
3. The method of claim 1, further comprising:
intercepting an operating system call from a software application executing within the secure desktop, wherein the operating system call requests access to a registry of the presenter device; and
redirecting the operating system call to a temporary registry associated with the secure desktop.
4. The method of claim 3, further comprising saving changes made to the temporary registry to the registry of the presenter device.
5. The method of claim 3, further comprising discarding changes made to the temporary registry.
6. The method of claim 2, further comprising:
intercepting an operating system call from a software application executing within the secure desktop, wherein the operating system call requests access to a file system of the presenter device; and
redirecting the operating system call to a temporary file system associated with the secure desktop.
7. The method of claim 6, further comprising saving changes made to the temporary file system to the file system of the presenter device.
8. The method of claim 6, further comprising discarding changes made to the temporary file system.
9. The method of claim 2, further comprising downloading the security policies to the presenter device from a server.
10. The method of claim 1, further comprising switching between the working desktop and the secure desktop using a secure icon.
11. The method of claim 1, further comprising setting security policies that restrict applications to be executed on the secure desktop.
12. The method of claim 11, wherein setting security policies comprises defining a location of a temporary registry and a temporary file system.
13. The method of claim 11, wherein setting security policies comprises defining desktop icons and wallpaper for the secure desktop.
14. A device comprising:
a network meeting application executing within a working desktop that provides a first environment for executing applications on a presenter device, wherein the network meeting application receives a request for a network meeting; and
a secure desktop, separate from the working desktop, automatically created by the network meeting application in response to the request as a second environment in which software applications can be launched by the presenter on the presenter device and execute on the presenter device during the network meeting,
wherein the network meeting application presents the secure desktop to a remote device via the network meeting, allows remote control of the secure desktop of the presenter device by the remote device, and blocks the remote device from accessing the working desktop of the presenter device.
15. The device of claim 14, wherein the secure desktop comprises:
a secure layer that intercepts an operating system call from a software application executing within the secure desktop, wherein the secure layer blocks the operating system call when security policies prevent the operating system calls.
16. The device of claim 14, wherein the secure desktop comprises:
a temporary registry,
wherein the secure layer intercepts an operating system call from a software application executing within the secure desktop, wherein the operating system call requests access to a registry of the presenter device, and
wherein the secure layer redirects the operating system call to the temporary registry.
17. The device of claim 16, wherein the secure layer saves changes made to the temporary registry to the registry of the presenter device.
18. The device of claim 16, wherein the secure layer discards changes made to the temporary registry.
19. The device of claim 14, wherein the secure desktop comprises:
a temporary file system,
wherein the secure layer intercepts an operating system call from a software application executing within the secure desktop, wherein the operating system call requests access to a file system of the presenter device, and
wherein the secure layer redirects the operating system call to the temporary file system.
20. The device of claim 19, wherein the secure layer saves changes made to the temporary file system to the file system of the presenter device.
21. The device of claim 19, wherein the secure layer discards changes made to the temporary file system.
22. The device of claim 14, wherein the network meeting application downloads security policies from a server for creating the secure desktop.
23. The device of claim 14, further comprising a secure icon for switching between the working desktop and the secure desktop.
24. The device of claim 14, wherein the security policies define a location of the temporary registry and a location of the temporary file system.
25. The device of claim 14, wherein the security policies define desktop icons and wallpaper for the secure desktop.
26. The device of claim 14, wherein the secure desktop has different wallpaper from the working desktop.
27. A system comprising:
a presenter device associated with a virtual private network (VPN) server, wherein a network meeting application executes within a working desktop of the presenter device, wherein the working desktop provides a first environment for launching and executing applications on the presenter device; and
one or more attendee devices associated with the VPN server, wherein at least one of the attendee devices requests a network meeting from the presenter device,
wherein, in response to the request, the presenter device automatically creates a secure desktop separate from the working desktop using the network meeting application as a second environment in which software applications can be launched by the presenter on the presenter device and execute on the presenter device during the network meeting, and
wherein the network meeting application presents the secure desktop to the one or more attendee devices via the network meeting, allows remote control of the secure desktop of the presenter device by the remote device, and blocks the remote device from accessing the working desktop of the presenter device.
28. The system of claim 27, wherein the presenter device downloads security policies from a server for creating the secure desktop.
29. The system of claim 27, wherein the secure desktop comprises a secure layer that intercepts operating system calls, wherein the secure layer checks the operating system calls against stored security policies.
30. The system of claim 27, wherein the secure desktop comprises:
a temporary registry,
wherein the secure layer intercepts an operating system call from a software application executing within the secure desktop, wherein the operating system call requests access to a registry of the presenter device, and
wherein the secure layer redirects the operating system call to the temporary registry.
31. The system of claim 27, wherein the secure desktop comprises:
a temporary file system,
wherein the secure layer intercepts an operating system call from a software application executing within the secure desktop, wherein the operating system call requests access to a file system of the presenter device, and
wherein the secure layer redirects the operating system call to the temporary file system.
32. A non-transitory computer-readable medium comprising instructions for causing a presenter device to:
with a network meeting application executing on the presenter device, receive a request for a network meeting at the presenter device having a working desktop as a first environment for executing applications on the presenter device;
with the network meeting application, automatically create, in response to the request, a secure desktop on the presenter device separate from the working desktop as a second environment in which software applications can be launched by the presenter on the presenter device and execute on the presenter device during the network meeting;
present, with the network meeting application, the secure desktop to a remote device via the network meeting;
with the network meeting application, allow remote control of the secure desktop of the presenter device by the remote device; and
with the network meeting application, block the remote device from accessing the working desktop of the presenter device.
33. The method of claim 1, further comprising:
executing a first software application within the working desktop of the presenter device; and
launching a second software application within the secure desktop of the presenter device while the first software application is executing within the working desktop.
US11/280,511 2005-11-16 2005-11-16 Secure desktop for a network meeting Active 2029-10-13 US8370431B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/280,511 US8370431B1 (en) 2005-11-16 2005-11-16 Secure desktop for a network meeting

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/280,511 US8370431B1 (en) 2005-11-16 2005-11-16 Secure desktop for a network meeting

Publications (1)

Publication Number Publication Date
US8370431B1 true US8370431B1 (en) 2013-02-05

Family

ID=47604701

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/280,511 Active 2029-10-13 US8370431B1 (en) 2005-11-16 2005-11-16 Secure desktop for a network meeting

Country Status (1)

Country Link
US (1) US8370431B1 (en)

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014143843A1 (en) * 2013-03-15 2014-09-18 Bodhi Technology Ventures Llc Controlling wireless device access to host device functionality
US9231894B1 (en) * 2013-08-14 2016-01-05 Infinite Convergence Solutions, Inc. Method and devices for instant message client swap
US20160006803A1 (en) * 2014-07-07 2016-01-07 Citrix Systems, Inc. Providing remote access to applications through interface hooks
US20160142259A1 (en) * 2014-11-17 2016-05-19 Wal-Mart Stores, Inc. System and method for discovery of devices on a network
US20170161507A1 (en) * 2014-08-29 2017-06-08 Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. Dual-system Electronic Apparatus and Terminal
US20170324561A1 (en) * 2016-05-04 2017-11-09 Avaya Inc. Secure application attachment
US10223682B2 (en) 2014-05-29 2019-03-05 Apple Inc. User device enabling access to payment information in response to mechanical input detection
CN110457112A (en) * 2019-08-21 2019-11-15 深圳市第三极智能物联有限公司 A kind of desktop conferencing and interaction systems
CN110489197A (en) * 2019-08-21 2019-11-22 深圳市第三极智能物联有限公司 A kind of single screen or mosaic screen realize the operating system of more person writings and interaction
US10567965B2 (en) 2013-03-15 2020-02-18 Apple Inc. Facilitating a secure session between paired devices
US10650443B2 (en) 2014-03-31 2020-05-12 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US10977716B2 (en) 2014-03-31 2021-04-13 Monticello Enterprises LLC System and method for providing multiple application programming interfaces for a browser to manage payments from a payment service
US11282131B2 (en) 2014-03-31 2022-03-22 Monticello Enterprises LLC User device enabling access to payment information in response to user input
US11310312B2 (en) 2014-07-07 2022-04-19 Citrix Systems, Inc. Peer to peer remote application discovery
US11343370B1 (en) 2012-11-02 2022-05-24 Majen Tech, LLC Screen interface for a mobile device apparatus
US11431834B1 (en) 2013-01-10 2022-08-30 Majen Tech, LLC Screen interface for a mobile device apparatus
US11461436B1 (en) * 2021-01-14 2022-10-04 Sprint Communications Company L.P. Trust zone hosted secure screen mode for discretionary presentation of sensitive corporate information to trusted endpoints
US11463576B1 (en) 2013-01-10 2022-10-04 Majen Tech, LLC Screen interface for a mobile device apparatus
US11836784B2 (en) 2014-03-31 2023-12-05 Monticello Enterprises LLC System and method for providing a search entity-based payment process

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5930473A (en) * 1993-06-24 1999-07-27 Teng; Peter Video application server for mediating live video services
US6061795A (en) * 1995-07-31 2000-05-09 Pinnacle Technology Inc. Network desktop management security system and method
US6343313B1 (en) * 1996-03-26 2002-01-29 Pixion, Inc. Computer conferencing system with real-time multipoint, multi-speed, multi-stream scalability
US20030179240A1 (en) * 2002-03-20 2003-09-25 Stephen Gest Systems and methods for managing virtual desktops in a windowing environment
US20040181579A1 (en) * 2003-03-13 2004-09-16 Oracle Corporation Control unit operations in a real-time collaboration server
US20050120082A1 (en) * 1999-12-02 2005-06-02 Lambertus Hesselink Managed peer-to-peer applications, systems and methods for distributed data access and storage
US20060064440A1 (en) * 2002-03-12 2006-03-23 Stuart Perry Data sharing and networking system for integrated remote tool access, data collection and control
US20060161623A1 (en) * 2001-04-13 2006-07-20 Elaine Montgomery Methods and apparatuses for selectively sharing a portion of a display for application based screen sampling
US20060167996A1 (en) * 2005-01-13 2006-07-27 Orsolini Garry S System and method for enabling electronic presentations
US20070094413A1 (en) * 2005-10-19 2007-04-26 Gabriel Salazar System and method for display sharing
US20070101148A1 (en) * 2005-10-17 2007-05-03 Microsoft Corporation Secure prompting
US7266779B2 (en) * 2002-04-22 2007-09-04 Microsoft Corporation Application sharing security
US20100024036A1 (en) * 2007-07-20 2010-01-28 Check Point Software Technologies, Inc. System and Methods Providing Secure Workspace Sessions

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5930473A (en) * 1993-06-24 1999-07-27 Teng; Peter Video application server for mediating live video services
US6061795A (en) * 1995-07-31 2000-05-09 Pinnacle Technology Inc. Network desktop management security system and method
US7197535B2 (en) * 1996-03-26 2007-03-27 Pixion, Inc. System and method for frame image capture
US6343313B1 (en) * 1996-03-26 2002-01-29 Pixion, Inc. Computer conferencing system with real-time multipoint, multi-speed, multi-stream scalability
US7310675B2 (en) * 1996-03-26 2007-12-18 Pixion, Inc. Providing data updates in a network communications system based on connection or load parameters
US20050080850A1 (en) * 1996-03-26 2005-04-14 Pixion, Inc. Real-time, multi-point, multi-speed, multi-stream scalable computer network communications system
US7369515B2 (en) * 1996-03-26 2008-05-06 Pixion, Inc. Providing conferencing data in a network communications system based on client capabilities
US20050120082A1 (en) * 1999-12-02 2005-06-02 Lambertus Hesselink Managed peer-to-peer applications, systems and methods for distributed data access and storage
US20060161623A1 (en) * 2001-04-13 2006-07-20 Elaine Montgomery Methods and apparatuses for selectively sharing a portion of a display for application based screen sampling
US20060064440A1 (en) * 2002-03-12 2006-03-23 Stuart Perry Data sharing and networking system for integrated remote tool access, data collection and control
US20030179240A1 (en) * 2002-03-20 2003-09-25 Stephen Gest Systems and methods for managing virtual desktops in a windowing environment
US20080183817A1 (en) * 2002-04-22 2008-07-31 Microsoft Corporation Application sharing security
US7266779B2 (en) * 2002-04-22 2007-09-04 Microsoft Corporation Application sharing security
US20040181579A1 (en) * 2003-03-13 2004-09-16 Oracle Corporation Control unit operations in a real-time collaboration server
US20060167996A1 (en) * 2005-01-13 2006-07-27 Orsolini Garry S System and method for enabling electronic presentations
US20070101148A1 (en) * 2005-10-17 2007-05-03 Microsoft Corporation Secure prompting
US20070094413A1 (en) * 2005-10-19 2007-04-26 Gabriel Salazar System and method for display sharing
US20100024036A1 (en) * 2007-07-20 2010-01-28 Check Point Software Technologies, Inc. System and Methods Providing Secure Workspace Sessions

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Virtual Desktop-Wikipedia. *
Virtual Desktop—Wikipedia. *

Cited By (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11343370B1 (en) 2012-11-02 2022-05-24 Majen Tech, LLC Screen interface for a mobile device apparatus
US11652916B1 (en) 2012-11-02 2023-05-16 W74 Technology, Llc Screen interface for a mobile device apparatus
US11463576B1 (en) 2013-01-10 2022-10-04 Majen Tech, LLC Screen interface for a mobile device apparatus
US11431834B1 (en) 2013-01-10 2022-08-30 Majen Tech, LLC Screen interface for a mobile device apparatus
US10039003B2 (en) 2013-03-15 2018-07-31 Apple Inc. Controlling access to protected functionality of a host device using a wireless device
US11785465B2 (en) 2013-03-15 2023-10-10 Apple Inc. Facilitating a secure session between paired devices
US10567965B2 (en) 2013-03-15 2020-02-18 Apple Inc. Facilitating a secure session between paired devices
US11212679B2 (en) 2013-03-15 2021-12-28 Apple Inc. Controlling access to protected functionality of a host device using a wireless device
US10440578B2 (en) 2013-03-15 2019-10-08 Apple Inc. Controlling access to protected functionality of a host device using a wireless device
US11115820B2 (en) 2013-03-15 2021-09-07 Apple Inc. Facilitating a secure session between paired devices
US10856152B2 (en) 2013-03-15 2020-12-01 Apple Inc. Controlling access to protected functionality of a host device using a wireless device
WO2014143843A1 (en) * 2013-03-15 2014-09-18 Bodhi Technology Ventures Llc Controlling wireless device access to host device functionality
US10750367B2 (en) 2013-03-15 2020-08-18 Apple Inc. Facilitating a secure session between paired devices
US10555175B2 (en) 2013-03-15 2020-02-04 Apple Inc. Controlling access to protected functionality of a host device using a wireless device
US9231894B1 (en) * 2013-08-14 2016-01-05 Infinite Convergence Solutions, Inc. Method and devices for instant message client swap
US10769717B2 (en) 2014-03-31 2020-09-08 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US11282131B2 (en) 2014-03-31 2022-03-22 Monticello Enterprises LLC User device enabling access to payment information in response to user input
US10650443B2 (en) 2014-03-31 2020-05-12 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US11669884B2 (en) 2014-03-31 2023-06-06 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US11468497B2 (en) 2014-03-31 2022-10-11 Monticello Enterprises LLC System and method for receiving data at a merchant device from a user device over a wireless link
US11836784B2 (en) 2014-03-31 2023-12-05 Monticello Enterprises LLC System and method for providing a search entity-based payment process
US10825079B2 (en) 2014-03-31 2020-11-03 Monticello Enterprises LLC System and method for providing data to a merchant device from a user device over a wireless link
US11461828B2 (en) 2014-03-31 2022-10-04 Monticello Enterprises LLC System and method for receiving data at a merchant device from a user device over a wireless link
US10977716B2 (en) 2014-03-31 2021-04-13 Monticello Enterprises LLC System and method for providing multiple application programming interfaces for a browser to manage payments from a payment service
US11074640B2 (en) 2014-03-31 2021-07-27 Monticello Enterprises LLC System and method for providing a universal shopping cart across multiple search platforms
US10223682B2 (en) 2014-05-29 2019-03-05 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US10699262B2 (en) 2014-05-29 2020-06-30 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US10489769B2 (en) 2014-05-29 2019-11-26 Apple Inc. User device enabling access to payment information in response to mechanical input detection
US11895184B2 (en) * 2014-07-07 2024-02-06 Citrix Systems, Inc. Peer to peer remote application discovery
US11283866B2 (en) * 2014-07-07 2022-03-22 Citrix Systems, Inc. Providing remote access to applications through interface hooks
US11310312B2 (en) 2014-07-07 2022-04-19 Citrix Systems, Inc. Peer to peer remote application discovery
US20220210223A1 (en) * 2014-07-07 2022-06-30 Citrix Systems, Inc. Peer to Peer Remote Application Discovery
US20160006803A1 (en) * 2014-07-07 2016-01-07 Citrix Systems, Inc. Providing remote access to applications through interface hooks
US20170161507A1 (en) * 2014-08-29 2017-06-08 Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. Dual-system Electronic Apparatus and Terminal
US10438004B2 (en) * 2014-08-29 2019-10-08 Yulong Computer Telecommunications Scientific (Shenzhen) Co., Ltd. Dual-system electronic apparatus and terminal
US10079728B2 (en) * 2014-11-17 2018-09-18 Vudu, Inc. System and method for discovery of devices on a network
US20160142259A1 (en) * 2014-11-17 2016-05-19 Wal-Mart Stores, Inc. System and method for discovery of devices on a network
US10601595B2 (en) * 2016-05-04 2020-03-24 Avaya Inc. Secure application attachment
US20170324561A1 (en) * 2016-05-04 2017-11-09 Avaya Inc. Secure application attachment
CN110457112A (en) * 2019-08-21 2019-11-15 深圳市第三极智能物联有限公司 A kind of desktop conferencing and interaction systems
CN110489197A (en) * 2019-08-21 2019-11-22 深圳市第三极智能物联有限公司 A kind of single screen or mosaic screen realize the operating system of more person writings and interaction
US11783014B2 (en) 2021-01-14 2023-10-10 T-Mobile Innovations, Llc Trust zone hosted secure screen mode for discretionary presentation of sensitive corporate information to trusted endpoints
US11461436B1 (en) * 2021-01-14 2022-10-04 Sprint Communications Company L.P. Trust zone hosted secure screen mode for discretionary presentation of sensitive corporate information to trusted endpoints

Similar Documents

Publication Publication Date Title
US8370431B1 (en) Secure desktop for a network meeting
US10936274B2 (en) Selective screen sharing
JP6775603B2 (en) Virtual browser integration
US9141412B2 (en) Terminal services application virtualization for compatibility
US8726337B1 (en) Computing with presentation layer for multiple virtual machines
US10607007B2 (en) Micro-virtual machine forensics and detection
US8433757B2 (en) Centralized management of applications and desktop preferences without requiring configuration of clientside operating systems
US11023088B2 (en) Composing the display of a virtualized web browser
US9292328B2 (en) Management of supervisor mode execution protection (SMEP) by a hypervisor
US8972980B2 (en) Automated provisioning of secure virtual execution environment using virtual machine templates based on requested activity
JP5483884B2 (en) Seamless integration of multiple computing environments
US8769268B2 (en) System and methods providing secure workspace sessions
US9921860B1 (en) Isolation of applications within a virtual machine
US9680873B1 (en) Trusted network detection
US10757079B2 (en) Method and system for controlling remote session on computer systems using a virtual channel
EP3440582A1 (en) Techniques for implementing persistently interactive software robots
US6971086B2 (en) Common user interface development toolkit for a system administration program
JP2022506846A (en) Preloading the application onto the user device based on the content received by the user device
US9104837B1 (en) Exposing subset of host file systems to restricted virtual machines based on upon performing user-initiated actions against host files
US20180336334A1 (en) Prevention of organizational data leakage across platforms based on device status
US20180096113A1 (en) Content Protection for a Screen Sharing Experience
US9558051B1 (en) Inter-process communication router within a virtualized environment
US10310696B1 (en) Supporting a consistent user interface within a virtualized environment
US9727534B1 (en) Synchronizing cookie data using a virtualized browser
WO2021108943A1 (en) Systems and methods for automated application launching

Legal Events

Date Code Title Description
AS Assignment

Owner name: JUNIPER NETWORKS, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:WANG, WANCHUN;XU, HAO;SIGNING DATES FROM 20051027 TO 20051114;REEL/FRAME:017249/0189

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: PULSE SECURE, LLC, CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:JUNIPER NETWORKS, INC.;REEL/FRAME:034036/0904

Effective date: 20141001

Owner name: JUNIPER NETWORKS, INC., CALIFORNIA

Free format text: SECURITY INTEREST;ASSIGNORS:PULSE SECURE, LLC;SMOBILE SYSTEMS, INC.;REEL/FRAME:034037/0526

Effective date: 20141001

AS Assignment

Owner name: U.S BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT

Free format text: SECURITY INTEREST;ASSIGNOR:PULSE SECURE, LLC;REEL/FRAME:037338/0408

Effective date: 20151104

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: CERBERUS BUSINESS FINANCE, LLC, AS COLLATERAL AGEN

Free format text: GRANT OF SECURITY INTEREST PATENTS;ASSIGNOR:PULSE SECURE, LLC;REEL/FRAME:042380/0859

Effective date: 20170501

Owner name: PULSE SECURE, LLC, CALIFORNIA

Free format text: RELEASE OF SECURITY INTEREST RECORDED AT REEL 037338, FRAME 0408;ASSIGNOR:US BANK NATIONAL ASSOCIATION;REEL/FRAME:042381/0568

Effective date: 20170501

AS Assignment

Owner name: PULSE SECURE, LLC, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JUNIPER NETWORKS, INC.;REEL/FRAME:053271/0307

Effective date: 20200720

Owner name: SMOBILE SYSTEMS, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:JUNIPER NETWORKS, INC.;REEL/FRAME:053271/0307

Effective date: 20200720

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

AS Assignment

Owner name: KKR LOAN ADMINISTRATION SERVICES LLC, AS COLLATERAL AGENT, NEW YORK

Free format text: SECURITY INTEREST;ASSIGNOR:PULSE SECURE, LLC;REEL/FRAME:053638/0220

Effective date: 20200824

Owner name: PULSE SECURE, LLC, CALIFORNIA

Free format text: RELEASE OF SECURITY INTEREST RECORDED AT REEL/FRAME 042380/0859;ASSIGNOR:CERBERUS BUSINESS FINANCE, LLC, AS AGENT;REEL/FRAME:053638/0259

Effective date: 20200824

AS Assignment

Owner name: PULSE SECURE, LLC, CALIFORNIA

Free format text: RELEASE OF SECURITY INTEREST : RECORDED AT REEL/FRAME - 053638-0220;ASSIGNOR:KKR LOAN ADMINISTRATION SERVICES LLC;REEL/FRAME:054559/0368

Effective date: 20201201

AS Assignment

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT, MARYLAND

Free format text: SECURITY INTEREST;ASSIGNORS:CELLSEC, INC.;PULSE SECURE, LLC;IVANTI, INC.;AND OTHERS;REEL/FRAME:054665/0062

Effective date: 20201201

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, ILLINOIS

Free format text: SECURITY INTEREST;ASSIGNORS:CELLSEC, INC.;PULSE SECURE, LLC;INVANTI, INC.;AND OTHERS;REEL/FRAME:054665/0873

Effective date: 20201201